A-level COMPUTER SCIENCE
|
|
- Cody Harris
- 7 years ago
- Views:
Transcription
1 A-level COMPUTER SCIENCE Paper 2 TBC am/pm 2 hours 30 minutes Materials There are no additional materials required for this paper. Instructions Use black ink or black ball-point pen. Fill in the boxes at the bottom of this page. Answer all questions. Do all rough work in this book. Cross through any work that you do not want to be marked. You may use a calculator. Information The marks for questions are shown in brackets. The maximum mark for this paper is 100. Advice In some questions you may be required to indicate your answer by shading a lozenge. If you wish to change your answer make sure that the incorrect answer is clearly crossed through with an x. Please write clearly, in block capitals, to allow character computer recognition. Centre number Candidate number Surname Forename(s) Candidate signature
2 2 Answer all questions in the spaces provided. 0 1 Figure 1 shows how some of the components of a computer system can be connected together. Figure 1 B E Controller C D Controller A Table 1 lists the names of six components in the column headings and the five letters (A-E) from Figure 1 in the row headings. For each row in Table 1, shade one lozenge, in the appropriate column, to indicate which component in Figure 1 has been labelled with the row letter. As an example, the first row has been completed for you, to indicate that component A in Figure 1 is the Address bus. [4 marks] Table 1 Processor Address bus Data bus Main memory Keyboard Visual display unit A B C D E 4
3 The internal buses in a computer use parallel communication while most peripherals communicate with a computer using serial communication. Explain the differences between the ways in which parallel and serial communication is carried out. Most peripherals, such as printers and keyboards, communicate with a computer using a serial connection Apart from the widespread availability of USB (Universal Serial Bus) ports, explain why peripherals usually use a serial communication method such as USB instead of parallel communication. [1 mark] In communications systems, a distinction is made between the bit rate and the baud rate Define the term baud rate. [1 mark] Explain how it is possible for the bit rate to be higher than the baud rate. [1 mark] 5 Turn over
4 4 0 3 A burglar alarm system is to be implemented that has the following sensors: a door sensor D that outputs TRUE when the door is open and FALSE when the door is shut a pressure mat sensor M that outputs TRUE while a weight is detected on it and FALSE when no weight is detected on it. The alarm also has a key K that turns the alarm on and off. K outputs a TRUE signal when the alarm is switched on and FALSE when the alarm is off. The alarm output A sounds a bell. It should be TRUE if: the alarm is on AND either of the sensors D or M are set to the value TRUE In the space below, draw a logic circuit that will behave as described above for the inputs D, M and K and the output A. K D A M Write a Boolean expression to represent the logic of this alarm system. A =
5 In this alarm system, the alarm bell will sound only while the door is open or a weight is placed on the pressure mat. If someone who has stepped on to the mat moves off it, or an open door is closed, the alarm bell will stop ringing. A D-type flip-flop could be incorporated into the logic circuit so that the alarm bell would continue to sound after a person closed the door or moved off the pressure mat. Explain how this could be achieved. In your answer refer to: why a D-type flip-flop would be suitable for this task where the D-type flip-flop would need to be inserted into the circuit what additional input the D-type flip-flop would need. [3 marks] 7 Turn over for the next question Turn over
6 6 0 4 The phrase Internet of Things is used to describe the connection of many everyday devices such as home heating controls, utility meters, cars and environmental sensors to the Internet. It is believed that tens of billions of devices will be connected to the Internet of Things by the end of the decade. One anticipated use of the Internet of Things is to monitor the food that consumers have inside their fridges. This data could be gathered automatically from consumers devices by retailers who sell food. Retailers could use the data to analyse consumer consumption habits or automatically prepare deliveries for customers. In the context of an Internet connected fridge, discuss the technologies that will be required to make the Internet of Things work. You may wish to consider how the data might be captured, how networking technologies are changing to provide the necessary infrastructure, and how the data gathered by retailers could be stored and processed, from a hardware and software viewpoint. [12 marks]
7 7 12 Turn over
8 8 0 5 The icon in Figure 2 is represented in a computer's memory as a bitmap image. Figure 2 Row Four different colours have been used in the icon. Row 1 of the icon is represented in the computer's memory as the bit pattern: What are the bit patterns that have been used to represent a grey pixel and a white pixel? [1 mark] Grey pixel: White pixel: State one possible 20-bit representation for Row 4 of the icon in Figure 2. [1 mark]
9 Calculate the number of bytes required to represent all the pixel data in the icon as a bitmap. Show your working. Answer: When the bitmap is saved as a file, the file size is bigger than the answer to This is because metadata is saved in the file with the pixel data State one item of metadata that would be stored in a bitmap file. [1 mark] Run-length encoding (RLE) is an example of a compression method that could be used to reduce the amount of memory required to store the icon in Figure Describe the principle used by RLE to compress a file and explain why RLE is an appropriate compression method for compressing images such as icons. [3 marks] 8 Turn over
10 Figure 3 shows the structure of an example machine code instruction, taken from the instruction set of a particular processor. Figure 3 Opcode Operand(s) Basic Machine Operation Addressing Mode How many different basic machine operations could be supported by the instruction set of the processor used in the example in Figure 3? [1 mark] Figure 4 shows an assembly language program together with the contents of a section of the main memory of the computer that the program will be executed on. The assembly language instruction set that has been used to write the program is listed in Table 2.The lines of the assembly language program have been numbered to help you answer question parts to Figure 4 Line Command 1 MOV R2, #100 2 LDR R3, ADD R2, R2, R3 4 LSL R3, R2, #1 5 HALT Memory Address (in decimal) Main Memory Contents (in decimal) What value will be stored in register R2 immediately after the command in line 1 has been executed? [1 mark] What value will be stored in register R2 immediately after the program has executed the commands from line 1 through to line 3? [1 mark] What value will be stored in register R3 after the complete program has finished executing? [1 mark]
11 11 Table 2 LDR Rd, <memory ref> Load the value stored in the memory location specified by <memory ref> into register d. STR Rd, <memory ref> Store the value that is in register d into the memory location specified by <memory ref>. ADD Rd, Rn, <operand2> Add the value specified in <operand2> to the value in register n and store the result in register d. SUB Rd, Rn, <operand2> Subtract the value specified by <operand2> from the value in register n and store the result in register d. MOV Rd, <operand2> Copy the value specified by <operand2> into register d. CMP Rn, <operand2> Compare the value stored in register n with the value specified by <operand2>. B <label> Always branch to the instruction at position <label> in the program. B<condition> <label> Conditionally branch to the instruction at position <label> in the program if the last comparison met the criteria specified by the <condition>. Possible values for <condition> and their meaning are: AND Rd, Rn, <operand2> ORR Rd, Rn, <operand2> EOR Rd, Rn, <operand2> MVN Rd, <operand2> LSL Rd, Rn, <operand2> LSR Rd, Rn, <operand2> HALT EQ: Equal to. NE: Not equal to. GT: Greater than. LT: Less than. Perform a bitwise logical AND operation between the value in register n and the value specified by <operand2> and store the result in register d. Perform a bitwise logical OR operation between the value in register n and the value specified by <operand2> and store the result in register d. Perform a bitwise logical exclusive or (XOR) operation between the value in register n and the value specified by <operand2> and store the result in register d. Perform a bitwise logical NOT operation on the value specified by <operand2> and store the result in register d. Logically shift left the value stored in register n by the number of bits specified by <operand2> and store the result in register d. Logically shift right the value stored in register n by the number of bits specified by <operand2> and store the result in register d. Stops the execution of the program. Interpretation of <operand2> <operand2> can be interpreted in two different ways, depending upon whether the first symbol is a # or an R: # - use the decimal value specified after the #, eg #25 means use the decimal value 25. Rm - use the value stored in register m, eg R6 means use the value stored in register 6. The available general purpose registers that the programmer can use are numbered 0 to 12. Question 6 continues on the next page Turn over
12 12 Programs written in a high-level language can be compiled or interpreted. Companies that develop computer programs to sell usually compile the final version of a program before distributing it to customers Explain why the final version of a computer program is usually translated using a compiler. The JavaScript programming language can be used to write programs that are executed in a web browser on any Internet user s computer Explain why programs written in the JavaScript language, to be executed in a web browser, are interpreted rather than compiled. 8
13 Figure 5 shows the physical topology of a local area network (LAN) and its connection to the Internet. The LAN uses the IPv4 protocol. Figure 5 Subnet Wireless Access Point Router 1 Switch Subnet B Router 2 A Switch Subnet Router and Firewall Internet State suitable IP addresses for: The Router 2 port labelled A : The computer network interface card labelled B : State one advantage of the star topology over the bus topology, and explain how this is achieved. Question 7 continues on the next page Turn over
14 14 Laptop computers connect to the network using WiFi. They use carrier sense multiple access with collision avoidance (CSMA/CA) to determine when to transmit data Describe how the CSMA/CA method is used. [6 marks] Each packet of data transmitted around the LAN includes a checksum, which is used for error detection Describe how the checksum is used for error detection. [3 marks] 13
15 A particular computer uses a normalised floating point representation with an 8-bit mantissa and a 4-bit exponent, both stored using two s complement. Four bit patterns that are stored in this computer s memory are listed in Figure 6 and are labelled A, B, C, D. Three of the bit patterns are valid floating point numbers and one is not. Figure 6 A Mantissa Exponent B C Mantissa Exponent Mantissa Exponent D Mantissa Exponent Complete Table 3. In the Correct letter (A-D) column shade the appropriate lozenge A, B, C or D to indicate which bit pattern in Figure 6 is an example of the type of value described in the Value description column. Do not use the same letter more than once. [3 marks] Table 3 Value description A positive normalised value Correct letter (A-D) A B C D The most negative value that can be represented A B C D A value that is not valid in the representation because it is not normalised A B C D Question 8 continues on the next page Turn over
16 The following is a floating point representation of a number: Mantissa Exponent Calculate the decimal equivalent of the number. Show how you have arrived at your answer. Answer: Write the normalised floating point representation of the negative decimal value in the boxes below. Show how you have arrived at your answer. [3 marks] Answer: Mantissa Exponent
17 17 An alternative two's complement format representation is proposed. In the alternative representation 6 bits will be used to store the mantissa and 6 bits will be used to store the exponent. Existing Representation (8-bit mantissa, 4-bit exponent): Mantissa Exponent Proposed Alternative Representation (6-bit mantissa, 6-bit exponent): Mantissa Exponent Explain the effects of using the proposed alternative representation instead of the existing representation. 10 Turn over for the next question Turn over
18 A school stores information about its sports day in a relational database. The details of the track events are stored using the three relations in Figure 7. Figure 7 Athlete (AthleteNumber, Forename, Surname, Class, Gender, DateOfBirth) Race (RaceNumber, Gender, Distance, Type, StartTime) RaceEntryAndResult (RaceNumber, AthleteNumber, TimeSet) Each athlete who takes part in a race is given a unique AthleteNumber. Athletes can run in more than one race. If they do, they keep the same AthleteNumber for the entire day. Many races are run throughout the day. An example race would be the boys 80m hurdles, the third race of the day, which starts at 13:30. The entry in the Race table for this race is shown in Table 4: Table 4 RaceNumber Gender Distance Type StartTime 3 Boys 80 Hurdles 13:30 When an athlete is entered into a race, a record of the entry is created in the RaceEntryAndResult table. Initially, the TimeSet is recorded as 00:00.00 (meaning 0 minutes, 0 seconds, 0 hundredths of a second) to indicate that the race has not yet been run. After the race has been run, if the athlete successfully completes it, then their TimeSet value is updated to record the time that they achieved in minutes, seconds and hundredths of a second. The TimeSet value remains at 00:00.00 for athletes who fail to complete the race. The primary keys in the Athlete and Race relations have been identified in Figure 7 by underlining them. The correct primary key for the RaceEntryAndResult relation has not been identified In Figure 8 below, underline the appropriate attribute name(s) to identify the correct primary key for this relation. [1 mark] Figure 8 RaceEntryAndResult(RaceNumber, AthleteNumber, TimeSet)
19 Relations in a database should usually be fully normalised. Define what it means for a database to be fully normalised On the incomplete Entity-Relationship diagram below show the degree of the three relationships that exist between the entities. Athlete RaceEntryAndResult Race Athlete number 27 is to be entered into race number 6. Write the SQL commands that are required to make this entry. Question 9 continues on the next page Turn over
20 20 Figure 7 is repeated below. Figure 7 (repeated) Athlete(AthleteNumber, Forename, Surname, Class, Gender, DateOfBirth) Race(RaceNumber, Gender, Distance, Type, StartTime) RaceEntryAndResult(RaceNumber, AthleteNumber, TimeSet) Athlete number 27 sets a time of 0:18.76 (0 minutes, 18 seconds, 76 hundredths of a second) for race number Write the SQL commands that are required to update the athlete s entry for this race, to store this time in the TimeSet field. [3 marks]
21 21 The competition organisers want to produce a list of all of the athletes who took part in race number 6 with the athlete who won (set the lowest time) at the top and the other athletes below the winner in the order in which they finished. Only athletes who finished the race should be included in the list. The following information should appear for each athlete: AthleteNumber, Forename, Surname and TimeSet Write an SQL query to produce the list. [5 marks] The database system is to be extended for use in an inter-school athletics league. Users at any school in the county will be able to access the system to input the results of races. It is possible that two users might try to access or update the system at the same time Explain the conditions under which simultaneous access to a database could cause a problem, and how this could be dealt with. [3 marks] 18 Turn over
22 Two computers, A and B, are involved in a secure communication that uses asymmetric encryption. A is sending a message to B Each computer has a public key and a private key. Complete the missing words in the following paragraph. A will encrypt the message using key. The message will be decrypted by B using key. The security of the communication could be improved by the addition of a digital signature State two benefits of including a digital signature. 4
23 Table 5 lists six Boolean equations. Three of them are correct, the others are not. Shade the lozenges next to the three equations are correct. [3 marks] Table 5 Equation A A 1 Correct? (Shade three) A B A B A 1 1 A (A B) A A (A B) B A Use Boolean algebra to simplify the following expression: A B B A Show your working. [3 marks] Answer: 6 Turn over for the next question Turn over
24 In a functional programming language, a recursively defined function named map and a function named double are defined as follows: map f [] = [] map f (x:xs) = f x : map f xs double x = 2 * x The function map has two parameters, a function f, and a list that is either empty (indicated as []), or non-empty, in which case it is expressed as (x:xs) in which x is the head and xs is the tail, which is itself a list In Table 6, write the value(s) that are the head and tail of the list [ 1, 2, 3, 4 ]. Table 6 [1 mark] Head Tail The result of making the function call double 3 is 6. Calculate the result of making the function call listed in Table 7. Table 7 [1 mark] Function Call map double [ 1, 2, 3, 4 ] Result Explain how you arrived at your answer to question steps that you followed. and the recursive [3 marks] END OF QUESTIONS 5
25 25 There are no questions printed on this page DO NOT WRITE ON THIS PAGE ANSWER IN THE SPACES PROVIDED
26 26 There are no questions printed on this page DO NOT WRITE ON THIS PAGE ANSWER IN THE SPACES PROVIDED
27 27 There are no questions printed on this page DO NOT WRITE ON THIS PAGE ANSWER IN THE SPACES PROVIDED Acknowledgement of copyright holders and publishers Permission to reproduce all copyright material has been applied for. In some cases, efforts to contact copyright holders have been unsuccessful and AQA will be happy to rectify any omissions of acknowledgements in future papers if notified. Copyright 2014 AQA and its licensors. All rights reserved. Turn over
Specimen 2015 am/pm Time allowed: 1hr 30mins
SPECIMEN MATERIAL GCSE COMPUTER SCIENCE 8520/1 Paper 1 Specimen 2015 am/pm Time allowed: 1hr 30mins Materials There are no additional materials required for this paper. Instructions Use black ink or black
More informationWritten examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
More informationFunctional Skills Certificate FUNCTIONAL ENGLISH
Please write clearly in block capitals. Centre number Candidate number Surname Forename(s) Candidate signature Functional Skills Certificate FUNCTIONAL ENGLISH Component 1 Reading Level 1 Thursday 12 November
More informationA-level PSYCHOLOGY (7182/1)
SPECIMEN MATERIAL A-level PSYCHOLOGY (7182/1) Paper 1 Introductory Topics in Psychology 2017 Morning Time allowed: 2 hours Materials For this paper you may have: a calculator. Instructions Use black ink
More informationHOMEWORK # 2 SOLUTIO
HOMEWORK # 2 SOLUTIO Problem 1 (2 points) a. There are 313 characters in the Tamil language. If every character is to be encoded into a unique bit pattern, what is the minimum number of bits required to
More informationwww.xtremepapers.net
UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education *83455669* INFORMATION AND COMMUNICATION TECHNOLOGY 047/0 Paper May/June 2009 2 hours Candidates
More informationGraded ARM assembly language Examples
Graded ARM assembly language Examples These examples have been created to help students with the basics of Keil s ARM development system. I am providing a series of examples that demonstrate the ARM s
More informationReport on the Examination
Version 1.0 0712 General Certificate of Education (A-level) June Computing COMP2 (Specification 2510) Unit 2: Computer Components, The Stored Program Concept and The Internet Report on the Examination
More informationAdvice For the multiple-choice questions, completely fill in the circle alongside the appropriate answer(s).
SPECIMEN ASSESSMENT MATERIAL GCSE GEOGRAPHY Paper 1 Living with the physical environment Specimen Materials For this paper you must have: a pencil a ruler. Time allowed: 1 hour 30 minutes Instructions
More informationGetting Started with IntelleView POS Administrator Software
Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)
More informationCHAPTER 7: The CPU and Memory
CHAPTER 7: The CPU and Memory The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
More informationSECTION C [short essay] [Not to exceed 120 words, Answer any SIX questions. Each question carries FOUR marks] 6 x 4=24 marks
UNIVERSITY OF KERALA First Degree Programme in Computer Applications Model Question Paper Semester I Course Code- CP 1121 Introduction to Computer Science TIME : 3 hrs Maximum Mark: 80 SECTION A [Very
More informationModbus and ION Technology
70072-0104-14 TECHNICAL 06/2009 Modbus and ION Technology Modicon Modbus is a communications protocol widely used in process control industries such as manufacturing. PowerLogic ION meters are compatible
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationOperating instructions TSE Wireless Software Home
Operating instructions TSE Wireless Software Home Table of contents 1. GENERAL 2 2. INSTALL SOFTWARE 2 2.1. Installation in Windows XP 2 2.2. Installation in Windows Vista 3 3. THE PROGRAM 0 3.1. Setup
More informationChapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
More informationGCE Computing. COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination.
GCE Computing COMP3 Problem Solving, Programming, Operating Systems, Databases and Networking Report on the Examination 2510 Summer 2014 Version: 1.0 Further copies of this Report are available from aqa.org.uk
More informationAn Introduction to Assembly Programming with the ARM 32-bit Processor Family
An Introduction to Assembly Programming with the ARM 32-bit Processor Family G. Agosta Politecnico di Milano December 3, 2011 Contents 1 Introduction 1 1.1 Prerequisites............................. 2
More informationZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
More informationTime allowed: 1 hour 45 minutes
GCSE PHYSICS Foundation Tier Paper 1F F Specimen 2018 Time allowed: 1 hour 45 minutes Materials For this paper you must have: a ruler a calculator the Physics Equation Sheet (enclosed). Instructions Answer
More informationAQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
More informationTHREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
More information2011, The McGraw-Hill Companies, Inc. Chapter 3
Chapter 3 3.1 Decimal System The radix or base of a number system determines the total number of different symbols or digits used by that system. The decimal system has a base of 10 with the digits 0 through
More informationGCSE COMBINED SCIENCE: TRILOGY
GCSE COMBINED SCIENCE: TRILOGY Higher Tier Paper 5: Physics 1H H Specimen 2018 Time allowed: 1 hour 15 minutes Materials For this paper you must have: a ruler a calculator the Physics Equation Sheet (enclosed).
More informationCambridge International Examinations Cambridge International General Certificate of Secondary Education
Cambridge International Examinations Cambridge International General Certificate of Secondary Education *0123456789* COMPUTER SCIENCE 0478/01 Paper 1 Theory For Examination from 2016 SPECIMEN PAPER 1 hour
More informationTwo's Complement Adder/Subtractor Lab L03
Two's Complement Adder/Subtractor Lab L03 Introduction Computers are usually designed to perform indirect subtraction instead of direct subtraction. Adding -B to A is equivalent to subtracting B from A,
More information150127-Microprocessor & Assembly Language
Chapter 3 Z80 Microprocessor Architecture The Z 80 is one of the most talented 8 bit microprocessors, and many microprocessor-based systems are designed around the Z80. The Z80 microprocessor needs an
More informationReligious Studies 40551 (Specification B) Religious Studies (Specification B) (Short Course)
General Certificate of Secondary Education June 2013 Religious Studies 40551 (Specification B) Religious Studies (Specification B) (Short Course) Unit 1 Religion and Citizenship Monday 13 May 2013 9.00
More informationMICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
More informationComputers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationLinksys E2000 Wireless-N Router Configuration Guide
Linksys E2000 Wireless-N Router Configuration Guide Revision 1.1 Copyright 2012 Maretron, LLP All Rights Reserved Maretron, LLP 9014 N. 23 rd Ave #10 Phoenix, AZ 85021-7850 http://www.maretron.com Maretron
More informationMATHEMATICS Unit Decision 1
General Certificate of Education January 2008 Advanced Subsidiary Examination MATHEMATICS Unit Decision 1 MD01 Tuesday 15 January 2008 9.00 am to 10.30 am For this paper you must have: an 8-page answer
More informationAUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR
AUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR INTRODUCTION This Project "Automatic Night Lamp with Morning Alarm" was developed using Microprocessor. It is the Heart of the system. The sensors
More informationplc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
More informationBLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
More informationThe Subnet Training Guide
The Subnet Training Guide A Step By Step Guide on Understanding and Solving Subnetting Problems by Brendan Choi v25 easysubnetcom The Subnet Training Guide v25 easysubnetcom Chapter 1 Understanding IP
More information2003 HSC Notes from the Marking Centre Software Design and Development
00 HSC Notes from the Marking Centre Software Design and Development 004 Copyright Board of Studies NSW for and on behalf of the Crown in right of the State of New South Wales. This document contains Material
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationNetworked AV Systems Pretest
Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials
More information2016 Morning Time allowed: 1 hour 30 minutes
SPECIMEN MATERIAL SECOND SET AS PSYCHOLOGY (7181/2) Paper 2 Psychology in Context 2016 Morning Time allowed: 1 hour 30 minutes Materials For this paper you may have: a calculator. Instructions Use black
More informationSpecimen Paper. Time allowed! 60 minutes
Centre Number Surname Candidate Number Specimen Paper For Examiner s Use Other Names Candidate Signature Examiner s Initials General Certificate of Secondary Education Foundation Tier Question 1 Mark Chemistry
More informationPhysics PH1FP. (Jun15PH1FP01) General Certificate of Secondary Education Foundation Tier June 2015. Unit Physics P1. Unit Physics P1 TOTAL
Centre Number Surname Candidate Number For Examiner s Use Other Names Candidate Signature Examiner s Initials Question Mark Science A Unit Physics P1 Physics Unit Physics P1 Friday 12 June 2015 General
More informationSOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card
More informationARM Cortex-M3 Assembly Language
ARM Cortex-M3 Assembly Language When a high level language compiler processes source code, it generates the assembly language translation of all of the high level code into a processor s specific set of
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationReligious Studies 40552 (Specification B) Religious Studies (Specification B) (Short Course)
General Certificate of Secondary Education June 2014 Religious Studies 40552 (Specification B) Religious Studies (Specification B) (Short Course) Unit 2 Religion and Life Issues Thursday 15 May 2014 1.30
More informationMACHINE ARCHITECTURE & LANGUAGE
in the name of God the compassionate, the merciful notes on MACHINE ARCHITECTURE & LANGUAGE compiled by Jumong Chap. 9 Microprocessor Fundamentals A system designer should consider a microprocessor-based
More informationSPECIMEN A451 GENERAL CERTIFICATE OF SECONDARY EDUCATION COMPUTING. Duration: 1 hour 30 minutes. Unit A451: Computer systems and programming
SPECIMEN GENERAL CERTIFICATE OF SECONDARY EDUCATION COMPUTING Unit A451: Computer systems and programming A451 Candidates answer on the Question Paper OCR Supplied Materials None Other Materials Required:
More informationLifeSize Networker Installation Guide
LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
More informationSpecimen Paper. Chemistry 1F. Time allowed! 60 minutes
Centre Number Surname Candidate Number Specimen Paper For Examiner s Use Other Names Candidate Signature Examiner s Initials General Certificate of Secondary Education Foundation Tier Question 1 Mark Science
More informationPoint-of-Sale software for Hospitality. www.posnet.nl. Bars. Catering & Food Delivery. Sport, Wellness. Restaurants
Point-of-Sale software for Hospitality Restaurants Chinese Restaurants Catering & Food Delivery Bars Sport, Wellness www.posnet.nl is a registered trademark by Benelux. All text is this manual is copyrighted
More informationDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV UNIT I THE 8086 MICROPROCESSOR 1. What is the purpose of segment registers
More informationQuick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationGeneral Certificate of Education Advanced Subsidiary Examination June 2015
General Certificate of Education Advanced Subsidiary Examination June 2015 Computing COMP1 Unit 1 Problem Solving, Programming, Data Representation and Practical Exercise Monday 1 June 2015 9.00 am to
More informationGrade Level Year Total Points Core Points % At Standard 9 2003 10 5 7 %
Performance Assessment Task Number Towers Grade 9 The task challenges a student to demonstrate understanding of the concepts of algebraic properties and representations. A student must make sense of the
More informationTraditional IBM Mainframe Operating Principles
C H A P T E R 1 7 Traditional IBM Mainframe Operating Principles WHEN YOU FINISH READING THIS CHAPTER YOU SHOULD BE ABLE TO: Distinguish between an absolute address and a relative address. Briefly explain
More informationTEST CHAPTERS 1 & 2 OPERATING SYSTEMS
TEST CHAPTERS 1 & 2 OPERATING SYSTEMS True/False Indicate whether the statement is true or false. 1. Changes that you make in virtual machines do not affect your physical computer. 2. The size of a bus
More informationS7 for Windows S7-300/400
S7 for Windows S7-300/400 A Programming System for the Siemens S7 300 / 400 PLC s IBHsoftec has an efficient and straight-forward programming system for the Simatic S7-300 and ern controller concept can
More informationYou can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.
IP Addressing & Subnetting Made Easy Working with IP Addresses Introduction You can probably work with decimal numbers much easier than with the binary numbers needed by the computer. Working with binary
More informationUMI (Universal Metering Interface)
UMI (Universal Metering Interface) Overview Cambridge Consultants Ltd Science Park Milton Road Cambridge England CB4 0DW Tel +44 (0)1223 420024 Fax +44 (0)1223 423373 Registered No: 1036298 England Cambridge
More information(Refer Slide Time: 00:01:16 min)
Digital Computer Organization Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture No. # 04 CPU Design: Tirning & Control
More informationMFC7840W Windows Network Connection Repair Instructions
Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine
More informationwhat operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?
Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
More informationProgramming Logic controllers
Programming Logic controllers Programmable Logic Controller (PLC) is a microprocessor based system that uses programmable memory to store instructions and implement functions such as logic, sequencing,
More informationInstalling an Omnicast System Omnicast version 3.5
Installing an Omnicast System Omnicast version 3.5 INST-9001 Version 1.0 INST-9001 Page 1 Omnicast Install Table of Contents 1 PREAMBLE...3 1.1 DOCUMENT REVISIONS...3 1.2 OMNICAST OVERVIEW...3 1.3 SUPPORTED
More informationA6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
More informationECDL / ICDL Word Processing Syllabus Version 5.0
ECDL / ICDL Word Processing Syllabus Version 5.0 Purpose This document details the syllabus for ECDL / ICDL Word Processing. The syllabus describes, through learning outcomes, the knowledge and skills
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
More informationPractical Programming, 2nd Edition
Extracted from: Practical Programming, 2nd Edition An Introduction to Computer Science Using Python 3 This PDF file contains pages extracted from Practical Programming, 2nd Edition, published by the Pragmatic
More informationTraining Document for Comprehensive Automation Solutions Totally Integrated Automation (T I A) MODULE A5 Programming the CPU 314C-2DP
Training Document for Comprehensive Automation Solutions Totally Integrated Automation (T I A) MODULE T I A Training Document Page 1 of 25 Module This document has been written by Siemens AG for training
More informationCourse Structure of Three Year Degree B.A Programme in Computer Application under Semester System of Dibrugarh University (General Programme)
Course Structure of Three Year Degree B.A Programme in Computer Application under Semester System of Dibrugarh University (General Programme) COURSE LECTURE DURATION(LD) /paper SEMESTER-I 1. Course Code:CAN101
More informationPART B QUESTIONS AND ANSWERS UNIT I
PART B QUESTIONS AND ANSWERS UNIT I 1. Explain the architecture of 8085 microprocessor? Logic pin out of 8085 microprocessor Address bus: unidirectional bus, used as high order bus Data bus: bi-directional
More informationThe Answer to the 14 Most Frequently Asked Modbus Questions
Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in
More informationBinary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More informationLevel 2 Development Training. Level 2 Development Training. Level 2 Development Training. Technical Overview
Level 2 Development Training Level 2 Development Training Level 2 Development Training Technical Overview Contents 1 Introduction... 3 Overview... 3 2 Glossary... 4 3 Network Technology... 5 Fundamentals...
More informationMulti-Touch Ring Encoder Software Development Kit User s Guide
Multi-Touch Ring Encoder Software Development Kit User s Guide v2.0 Bulletin #1198 561 Hillgrove Avenue LaGrange, IL 60525 Phone: (708) 354-1040 Fax: (708) 354-2820 E-mail: instinct@grayhill.com On the
More informationYZP 480...495: SAUTER Vision Center
YZP 480...495: SAUTER Vision Center SAUTER Vision Center 3.0 - latest-generation modular building management software for energy-efficient buildings The SAUTER Vision Center (SVC) is a web-based building
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
More informationApplication Unit, MDRC AB/S 1.1, GH Q631 0030 R0111
, GH Q631 0030 R0111 SK 0010 B 98 The application unit is a DIN rail mounted device for insertion in the distribution board. The connection to the EIB is established via a bus connecting terminal at the
More informationCS101 Lecture 26: Low Level Programming. John Magee 30 July 2013 Some material copyright Jones and Bartlett. Overview/Questions
CS101 Lecture 26: Low Level Programming John Magee 30 July 2013 Some material copyright Jones and Bartlett 1 Overview/Questions What did we do last time? How can we control the computer s circuits? How
More informationAddressing The problem. When & Where do we encounter Data? The concept of addressing data' in computations. The implications for our machine design(s)
Addressing The problem Objectives:- When & Where do we encounter Data? The concept of addressing data' in computations The implications for our machine design(s) Introducing the stack-machine concept Slide
More informationGeneral Certificate of Education Advanced Level Examination June 2013
General Certificate of Education Advanced Level Examination June 2013 Accounting ACCN4 Unit 4 Further Aspects of Management Accounting Monday 10 June 2013 1.30 pm to 3.30 pm For this paper you must have:
More informationThe string of digits 101101 in the binary number system represents the quantity
Data Representation Section 3.1 Data Types Registers contain either data or control information Control information is a bit or group of bits used to specify the sequence of command signals needed for
More informationBusiness Studies 413002
Centre Number Surname 1 Candidate Number For Examiner s Use Other Names Candidate Signature Examiner s Initials General Certificate of Secondary Education June 2014 Business Studies 413002 Unit 2 Growing
More informationOPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher
OPERATION MANUAL MV-410RGB Layout Editor Version 2.1- higher Table of Contents 1. Setup... 1 1-1. Overview... 1 1-2. System Requirements... 1 1-3. Operation Flow... 1 1-4. Installing MV-410RGB Layout
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More information1. Convert the following base 10 numbers into 8-bit 2 s complement notation 0, -1, -12
C5 Solutions 1. Convert the following base 10 numbers into 8-bit 2 s complement notation 0, -1, -12 To Compute 0 0 = 00000000 To Compute 1 Step 1. Convert 1 to binary 00000001 Step 2. Flip the bits 11111110
More informationWireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationSequential Logic. (Materials taken from: Principles of Computer Hardware by Alan Clements )
Sequential Logic (Materials taken from: Principles of Computer Hardware by Alan Clements ) Sequential vs. Combinational Circuits Combinatorial circuits: their outputs are computed entirely from their present
More informationLecture 8: Synchronous Digital Systems
Lecture 8: Synchronous Digital Systems The distinguishing feature of a synchronous digital system is that the circuit only changes in response to a system clock. For example, consider the edge triggered
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationCambridge International Examinations Cambridge International General Certificate of Secondary Education. Paper 1 May/June 2014 2 hours
*3483070646* Cambridge International Examinations Cambridge International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY 047/ Paper May/June 04 hours Candidates answer
More informationRARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationGeneral Certificate of Education Advanced Level Examination January 2013
General Certificate of Education Advanced Level Examination January 2013 Accounting ACCN4 Unit 4 Further Aspects of Management Accounting Tuesday 29 January 2013 1.30 pm to 3.30 pm For this paper you must
More information